© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved..
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Implementing Secure Converged Wide Area Networks (ISCW)
Securing the Router Chris Cunningham.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Chapter 9: Access Control Lists
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Multiarea OSPF Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
Implementing a Highly Available Network
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Operating Cisco IOS Software.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NMS Labs Mikko Suomi LAB1 Choose SNMP device managment software Features: –Gives Nice overview of network –Bandwith monitoring –Multible.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
Operating Cisco IOS Software
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Cisco Configuration Elements Network Monitoring and Management Tutorial.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Net Flow Network Protocol Presented By : Arslan Qamar.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—13-1 Lesson 13 Switching and Routing.
© 2002, Cisco Systems, Inc. All rights reserved..
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Instructor Materials Chapter 8 Configuring Cisco Devices
Instructor Materials Chapter 8: DHCP
© 2002, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 5: Network Security and Monitoring
100% Exam Passing Guarantee & Money Back Assurance
Working at a Small-to-Medium Business or ISP – Chapter 8
SNMP M Clements ENS.
CCNA Routing and Switching Routing and Switching Essentials v6.0
SNMP M Clements ENS.
Chapter 10: Device Discovery, Management, and Maintenance
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 6: Network Layer
Chapter 2: Basic Switching Concepts and Configuration
NAT , Device Discovery Chapter 9 , chapter 10.
Chapter 5: Network Security and Monitoring
Chapter 10: Device Discovery, Management, and Maintenance
SNMP M Clements ENS.
Chapter 8: Monitoring the Network
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Introduction 8.1 Syslog 8.2 SNMP 8.3 NetFlow 8.4 Summary

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Objectives  Explain syslog operation in a small-to-medium-sized business network.  Configure syslog to compile messages on a small-to-medium-sized business network management device.  Explain syslog operation in small-to-medium-sized business network.  Configure SNMP to compile messages on a small-to-medium-sized business network.  Describe NetFlow operation in a small-to-medium-sized business network.  Configure NetFlow data export on a router.  Examine sample NetFlow data to determine traffic patterns.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Syslog

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog Operation Introduction to Syslog

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog Operation

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog Operation Syslog Message Format

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog Operation Syslog Message Format

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog Operation Service Timestamp  Log messages can be time-stamped and the source address of syslog messages can be set. This enhances real-time debugging and management.  The service timestamps log datetime msec command entered in global configuration mode should be entered on the device.  In this chapter, it is assumed that the clock has been set and the service timestamps log datetime msec command has been configured on all devices.

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring Syslog Syslog Server  The syslog server provides a relatively user-friendly interface for viewing syslog output.  The server parses the output and places the messages into pre- defined columns for easy interpretation. If timestamps are configured on the networking device sourcing the syslog messages, then the date and time of each message displays in the syslog server output.  Network administrators can easily navigate the large amount of data compiled on a syslog server.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring Syslog Default Logging

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring Syslog Router and Switch Commands for Syslog Clients

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring Syslog Verifying Syslog

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Syslog in PT  R1(config)# service timestamps log datetime msec  R1# clock set 14:00:00 20 Mar 2014  R1(config)# logging  R1(config)# logging trap debugging  R1(config)# logging console  R1(config)# logging buffered  R1(config)# interface loopback 0  shutdown  no shutdown

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID SNMP

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation Introduction to SNMP

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation SNMP Agent Traps

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation SNMP Versions There are several versions of SNMP, including:  SNMPv1 - The Simple Network Management Protocol, a Full Internet Standard, defined in RFC  SNMPv2c - Defined in RFCs 1901 to 1908; utilizes community- string-based Administrative Framework.  SNMPv3 - Interoperable standards-based protocol originally defined in RFCs 2273 to 2275; provides secure access to devices by authenticating and encrypting packets over the network. It includes these security features: message integrity to ensure that a packet was not tampered with in transit; authentication to determine that the message is from a valid source, and encryption to prevent the contents of a message from being read by an unauthorized source.

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation Community Strings There are two types of community strings:  Read-only (ro) – Provides access to the MIB variables, but does not allow these variables to be changed, only read. Because security is so weak in version 2c, many organizations use SNMPv2c in read-only mode.  Read-write (rw) – Provides read and write access to all objects in the MIB.

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential SNMP Operation Management Information Base Object ID

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring SNMP Steps for Configuring SNMP Step 1. (Required) Configure the community string and access level (read-only or read-write) with the snmp-server community string ro | rw command. Step 2. (Optional) Document the location of the device using the snmp-server location text command. Step 3. (Optional) Document the system contact using the snmp- server contact text command.

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring SNMP Steps for Configuring SNMP (cont.) Step 4. (Optional) Restrict SNMP access to NMS hosts (SNMP managers) that are permitted by an ACL. Define the ACL and then reference the ACL with the snmp-server community string access-list-number-or-name command. Step 5. (Optional) Specify the recipient of the SNMP trap operations with the snmp-server host host-id [version {1 | 2c | 3 [auth | noauth | priv]}] community- string command. By default, no trap manager is defined. Step 6. (Optional) Enable traps on an SNMP agent with the snmp- server enable traps notification-types command.

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring SNMP Verifying SNMP Configuration

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring SNMP Security Best Practices

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID NetFlow

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential NetFlow Operation Introduction to NetFlow

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential NetFlow Operation Purpose of NetFlow Most organizations use NetFlow for some or all of the following key data collection purposes:  Efficiently measuring who is using what network resources for what purpose.  Accounting and charging back according to the resource utilization level.  Using the measured information to do more effective network planning so that resource allocation and deployment is well- aligned with customer requirements.  Using the information to better structure and customize the set of available applications and services to meet user needs and customer service requirements.

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential NetFlow Operation Network Flows NetFlow technology has seen several generations that provide more sophistication in defining traffic flows, but “original NetFlow” distinguished flows using a combination of seven key fields.  Source and destination IP address  Source and destination port number  Layer 3 protocol type  Type of service (ToS) marking  Input logical interface

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Configuring NetFlow NetFlow Configuration Tasks

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Examining Traffic Patterns Verifying NetFlow

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Examining Traffic Patterns NetFlow Collector Functions

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Examining Traffic Patterns NetFlow Analysis with a NetFlow Collector

Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Summary  Syslog, SNMP, and NetFlow are the tools a network administrator uses in a modern network to manage the collection, display, and analysis of events associated with the networking devices.  Syslog provides a rudimentary tool for collecting and displaying messages as they appear on a Cisco device console display.  SNMP has a very rich set of data records and data trees to both set and get information from networking devices.  NetFlow and its most recent iteration, Flexible NetFlow, provides a means of collecting IP operational data from IP networks.  NetFlow provides data to enable network and security monitoring, network planning, traffic analysis, and IP accounting.  NetFlow collectors provide sophisticated analysis options for NetFlow data.

Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential